CVE-2021-28937

The /password.html page of the Web management interface of the Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) contains the administrator account password in plaintext. The page can be intercepted on HTTP.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:acexy:wireless-n_wifi_repeater_firmware:28.08.06.1:*:*:*:*:*:*:*
cpe:2.3:h:acexy:wireless-n_wifi_repeater:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:00

Type Values Removed Values Added
References () http://acexy.com - Broken Link, Vendor Advisory () http://acexy.com - Broken Link, Vendor Advisory
References () https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 - Exploit, Third Party Advisory () https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 - Exploit, Third Party Advisory

Information

Published : 2021-03-29 13:15

Updated : 2024-11-21 06:00


NVD link : CVE-2021-28937

Mitre link : CVE-2021-28937

CVE.ORG link : CVE-2021-28937


JSON object : View

Products Affected

acexy

  • wireless-n_wifi_repeater_firmware
  • wireless-n_wifi_repeater
CWE
CWE-312

Cleartext Storage of Sensitive Information